>
CUET (PG)
List of top Questions asked in CUET (PG)
Consider the following set of processes with the length of the CPU burst time given in milliseconds:
The processes are assumed to have arrived in order P1, P2, P3, P4, P5 all at time 0. What is the waiting time of process P4 for Shortest Job First (SJF), non-preemptive priority scheduling, and Round Robin (Quantum=1) scheduling algorithms respectively?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Operating Systems
Consider the following statements and choose the correct one:
(A) Job schedulers select processes from the pool and load them into memory for execution.
(B) Short term scheduler selects among the processes that are ready to execute and allocates the CPU to one of them.
(C) Medium term scheduler increases the degree of multiprogramming.
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Operating Systems
A pulse is applied to each input of a 2-input NAND gate. One pulse goes high at t=0 and goes back low at t=1ms. The other pulse goes high at t=0 and goes back low at t=3ms. The output pulse can be described as follows:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
Add the following hexadecimal numbers:
\(DF_{16} + AC_{16}\)
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
Which of the following statement(s) is/are correct about Stacking in the context of machine learning?
(A) A logistic regression will definitely work better in the second stage as compared to other classification models.
(B) A machine learning model is trained on predictions of multiple machine learning models.
(C) First stage models are trained on full/partial feature space of training data.
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
Which is/are true about bias and variance?
(A) High bias means that the model is underfitting.
(B) High variance means that the model is overfitting.
(C) High bias means that the model is overfitting.
(D) Bias and variance are inversely proportional to each other.
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
Given (x1, y1), (x2, y2), ..., (xn, yn), the best fitting data to y=f(x) by least squares requires minimization of:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
Which of the following activation function outputs is zero-centered?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
Which of the following is/are true about outliers?
(A) Linear Regression is not sensitive to outliers.
(B) Outliers can never be present in the test set.
(C) Outlier is a data point that is significantly close to other data points.
(D) The nature of our business problem determines how outliers are used.
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Data Science
If x ∈ [0, 1], and f(x) and g(x) are defined as: f(x) = sin(cos(πx/4)) and g(x) = cos(sin(πx/4)) then:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Set Theory & Algebra
The simultaneous equations on the Boolean variables x, y, z, and w are: x + y + z = 1, xy = 0, x + y + w = 1, xy + z = 0. The solution for x, y, z, and w, respectively, is:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
Which of the following statements are not true?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
An FPGA with an embedded logic function that cannot be programmed is said to be:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
A system transmits a block of information containing ten packets each with eight data bits, a start bit, and a stop bit. Additional 'overhead' bits include a 4-bit synchronization code at the beginning of the block and a parity bit at the end of the block. What is the transmission efficiency?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Computer Networks
What is meant by factoring?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Digital Logic
What is a perception check?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Artificial Intelligence
Match List I with List II.
LIST I
LIST II
(A) Unification
(I) Variable can be done with a constant, another variable, or a function.
(B) Deep backtracking
(II) The entire conjunctive goal is executed.
(C) Forward movement
(III) Choose subgoal with possible unifier.
(D) Shallow backtracking
(IV) Previous subgoal to find alternative solutions.
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Consider the FOL sentence F: ∀x(∃y R(x, y)). Assuming non-empty logical domains, which of the sentences below are implied by F?
(A) ∃y(∃x R(x, y))
(B) ∃y(∀x R(x, y))
(C) ∀y(∃x R(x, y))
(D) ¬∃x(∀y ¬R(x, y))
Choose the correct answer from the options given below:
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Match List I with List II
LIST I
LIST II
(A) lim
x→1
(1 − x)
1/x
(I) e
(B) lim
x→0
1/x ln(1 − x)
(II) 1
(C) lim
x→0
(1 + x
2
)
1/x
(III) 0
(D) lim
x→∞
(1 + 1/x)
x
(IV) 2
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Algorithm
Let A be a 2 × 2 matrix with elements
\(a_{11} = a_{12} = a_{21} = +1\)
and
\(a_{22} = −1\)
. Then the eigenvalues of matrix A
2
are
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Set Theory & Algebra
Equation x
2
− 1 = 0 is required to be solved using Newton Raphson’s method with an initial guess x0 = −1. Then after one step of Newton’s method, the estimate x1 of the solution will be given by
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Algorithm
Let P be a regular language and Q be a context-free language such that Q ⊆ P. Then which of the following is always regular?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Which of the following languages are context-free?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Finite Languages satisfy the pumping lemma by having n = .
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Theory of Computations
Let Σ be a finite non-empty alphabet and let 2Σ* be the power set of Σ*. Which one of the following is true?
CUET (PG) - 2024
CUET (PG)
Data Science A.I Cyber Security and Computer Sci.
Set Theory & Algebra
Prev
1
...
283
284
285
286
287
...
491
Next